MinaAcces: Information System for access control in mining center

被引:0
|
作者
Janeth Lancheros-Cuesta, Diana [1 ]
Gomez, Laura [1 ]
Gonzales, Jenifer [1 ]
机构
[1] La Salle Univ, Bogota, Colombia
来源
2016 11TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI) | 2016年
关键词
Database; Access Control; Interface; Personal Identification Information System; RFID; XBee;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Technological infrastructure and mines in Colombia conditions do not meet the standards, promoting events that endanger the lives of miners. This paper presents the design and implementation of an information system for access control and management of priority information in a central mining exploitation. The developed system allows to control the access of the miners, with alarms that warn of possible people trapped in the mines. The software has two applications (Web and Windows) designed in Visual Studio and the database in Microsoft SQL server, which interact with the hardware part, consisting of RFID devices for personnel identification, XBee modules for remote transmission and drivers arduino. The system was designed for the American mining company Coal Colombo in order to automate information management and process control access on its premises.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Mining Data From National Center for Biotechnology Information System
    Shao, Wenwu
    Yang, Jiong
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 273 - 275
  • [2] Development of an information security data-mining system for a situation center
    T. I. Buldakova
    A. Sh. Dzhalolov
    Automatic Documentation and Mathematical Linguistics, 2014, 48 (2) : 71 - 77
  • [3] Development of an Information Security Data-Mining System for a Situation Center
    Buldakova, T. I.
    Dzhalolov, A. Sh.
    AUTOMATIC DOCUMENTATION AND MATHEMATICAL LINGUISTICS, 2014, 48 (02) : 71 - 77
  • [4] Access data from 'legacy' control and information system
    Porter, T
    CHEMICAL ENGINEERING, 1998, 105 (05) : 138 - +
  • [5] Research on Access Control Policy for Confidential Information System
    Zhang, Jian
    Yao, Jin
    Huang, Kun
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3064 - 3067
  • [6] Grid accounting information gathering system with access control
    Kim, BK
    An, DU
    Chung, SJ
    Jang, HJ
    WEB TECHNOLOGIES RESEARCH AND DEVELOPMENT - APWEB 2005, 2005, 3399 : 845 - 850
  • [7] Application of rough sets in power system control center data mining
    Lambert-Torres, G
    2002 IEEE POWER ENGINEERING SOCIETY WINTER MEETING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2002, : 627 - 631
  • [8] Formal Verification for Access Control in Web Information Sharing System
    Sakai, Akihiro
    Hori, Yoshiaki
    Sakurai, Kouichi
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 80 - +
  • [9] Switchover of access control policy for content management information system
    Wang, Hai-Ling
    Hao, Yu-Jie
    Bai, Jing-Pei
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2013, 42 (05): : 749 - 752
  • [10] MANAGEMENT OF ACCESS CONTROL IN INFORMATION SYSTEM BASED ON ROLE CONCEPT
    Poniszewska-Maranda, Aneta
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2011, 12 (01): : 35 - 49